نتایج جستجو برای: supply network configuration
تعداد نتایج: 925780 فیلتر نتایج به سال:
The present paper investigates the reliability and sensitivity analysis of a coal handling unit of a thermal power plant using a probabilistic approach. Coal handling unit is the main block of a thermal power plant and it is necessary for a good function of a power plant that its power supply, which is dealt in coal handling unit, must function continuously without any obstacle. The configurati...
This paper presents the proposal and implementation of a power management architecture for local area network environments. Our main goal is to contribute to more efficient use of electricity, reducing energy waste by facilitating the configuration of power policies and providing a means to automate their execution. The architecture we propose is based on the SNMP (Simple Network Management Pro...
A considerable amount of perishable products especially in the food and agriculture is corrupted annually due to the lack of effective mechanism in the supply chain. So, in this study, we tried to improve these unfavorable conditions by designing an efficient supply chain network minimizing costs for perishable products. Due to lack of adequate researches in the field of perishable supply chain...
Wide-area visual sensor networks are becoming more and more common. They have wide-range of commercial and military applications from video surveillance to smart home and from traffic monitoring to anti-terrorism. The design of such a visual sensor network is a challenging problem due to the complexity of the environment, self and mutual occlusion of moving objects, diverse sensor properties an...
A supply chain is composed of a complex sequence of processing stages, ranging from raw materials supplies, parts manufacturing, components and end-products assembling, to the delivery of end products. In the context of supply chain management, supplier selection decision is considered one of the key issues faced by operations and purchasing managers to remain competitive. Therefore, requiremen...
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید